CVE-2020-7838

8.8 HIGH

📋 TL;DR

This is an arbitrary code execution vulnerability in Smilegate STOVE Client where improper input validation allows attackers to execute arbitrary code when users access malicious web pages. It affects STOVE Client version 0.0.4.72, potentially compromising user systems.

💻 Affected Systems

Products:
  • Smilegate STOVE Client
Versions: 0.0.4.72
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific vulnerable version. Users must have STOVE Client installed and access malicious web content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the victim's machine, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation leading to credential theft, cryptocurrency mining, or system disruption for individual users.

🟢

If Mitigated

Limited impact with proper endpoint protection blocking malicious payloads and user awareness preventing access to suspicious sites.

🌐 Internet-Facing: HIGH - Exploitation requires user interaction but can be triggered through web pages, making it accessible to remote attackers.
🏢 Internal Only: MEDIUM - Requires user to access malicious content, which could be delivered through internal phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (accessing malicious web page) but no authentication. The CWE-20 (Improper Input Validation) suggests straightforward exploitation once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 0.0.4.72

Vendor Advisory: https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35851

Restart Required: Yes

Instructions:

1. Open STOVE Client. 2. Check for updates in settings. 3. Install available updates. 4. Restart the application. 5. Verify version is updated beyond 0.0.4.72.

🔧 Temporary Workarounds

Disable STOVE Client Browser Integration

windows

Prevents web pages from interacting with STOVE Client components

Check STOVE Client settings for browser integration options and disable them

Use Web Browser with Enhanced Security

all

Configure browser to block suspicious scripts and downloads

Enable enhanced security modes in browser settings

🧯 If You Can't Patch

  • Uninstall STOVE Client version 0.0.4.72 completely
  • Implement application whitelisting to block execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check STOVE Client version in application settings or About section. If version is exactly 0.0.4.72, system is vulnerable.

Check Version:

Check application settings or look for version information in STOVE Client interface

Verify Fix Applied:

Verify STOVE Client version is higher than 0.0.4.72 after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from STOVE Client
  • Suspicious network connections originating from STOVE process
  • Unexpected file writes in STOVE directories

Network Indicators:

  • Outbound connections to suspicious domains after STOVE Client execution
  • Unusual HTTP requests from STOVE process

SIEM Query:

Process Creation where ParentImage contains 'STOVE' AND CommandLine contains suspicious patterns

🔗 References

📤 Share & Export